General

  • Target

    fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3

  • Size

    715KB

  • Sample

    241111-c5nr9sznex

  • MD5

    a3f1773ec835b4a940e1bb9a89f771ef

  • SHA1

    d901e7e7416fd7140bd78fa47bcbf39010b35d0f

  • SHA256

    fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3

  • SHA512

    a0d9a6fcae78dcad3bbcd8c10e91a23b2c24e187a8f4602519645ab98e006c685b89a96fd3b6c7515b62673c23776bc9df99cce22064748820a55512c31c6f0c

  • SSDEEP

    12288:1MrGy90fKtSVoYzDlx5QYjQcM0hWnkWlAQITvDMpJbtx7o3N2SyxnDbz7w5GDM9s:fyIKgVooDQb0QkqAQITvDMzbH092Pv4e

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3

    • Size

      715KB

    • MD5

      a3f1773ec835b4a940e1bb9a89f771ef

    • SHA1

      d901e7e7416fd7140bd78fa47bcbf39010b35d0f

    • SHA256

      fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3

    • SHA512

      a0d9a6fcae78dcad3bbcd8c10e91a23b2c24e187a8f4602519645ab98e006c685b89a96fd3b6c7515b62673c23776bc9df99cce22064748820a55512c31c6f0c

    • SSDEEP

      12288:1MrGy90fKtSVoYzDlx5QYjQcM0hWnkWlAQITvDMpJbtx7o3N2SyxnDbz7w5GDM9s:fyIKgVooDQb0QkqAQITvDMzbH092Pv4e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks